Analysis
-
max time kernel
14s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 00:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0897ff53384810f4e68f01bac778bcd7.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
0897ff53384810f4e68f01bac778bcd7.exe
-
Size
1.0MB
-
MD5
0897ff53384810f4e68f01bac778bcd7
-
SHA1
3e0e20cab5db93d615f1f753a75338440ccffbf6
-
SHA256
fb90e44b3cee07603ac920b560d1d792346f8e66a3a85ddeda6df64ba25cb832
-
SHA512
e4b0f107717421d78fb7cfa87a881ed1d3a5d458926dc1897b747b10177acb6ef89ee576da59c03225e4361fe7324ab0ad0f46dd265abb92a0c93a9ccd4962a4
-
SSDEEP
24576:9ht/BcMXmE5ZIFQL/Qcpi7UOOrqTlHCRifwzBbUY:9jB9WPFQLIdg1olVfwzBX
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 29 ip-api.com 4 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0897ff53384810f4e68f01bac778bcd7.exedescription pid process Token: SeDebugPrivilege 2576 0897ff53384810f4e68f01bac778bcd7.exe